HackDig : Dig high-quality web security articles for hacker

Cybercrime operations can be intricate and elaborate, with careful planning needed to navigate the various obstacles separating an attacker from a payout. Yet reports on these operations are often fragmentary, as the full scope of attacker activity typically occurs beyond the view of any one group of investigators.
FireEye Threat Intelligence and iSIGHT Part

This is Cool Stuff…
When we launched the second revision of our ThreatScape API early this year, we were extremely excited about the pivot functionality we added as we heard from a number of customers doing security operations and incident response that they needed functionality to rapidly move between data and intelligence for correlation and alert pr